the so called demo video doesn't prove anything... almost anyone can make a window in C++ pop up and say "computer infected successfully, rebooting"

Click to expand...

But it's reality...
And you did not understand the video, it's what he shows AFTER reboot.
Hes "bootkit" is written that way that when he checks whoami it will deactivate uac.. so the first time he writes whoami it will output hes User account (limited access), the second time he writes whoami he has Admin
Ofc this is proves it's working, and its just written that way to PROVE it, he doesn't really need to depend on any input like that.

The windows7 UAC Exploits work on Windows 8 right now, yes UAC is useless against any good Trojan/Virus/Malware.

He shows off just another way to exploit UAC, there a dozen UAC exploits out there, all of em can completly bypass UAC and start stuff as Admin, accept it.

But one note: nearly all of these exploit fail when you set UAC to the MAXIMAL setting (you know, the extremly annoying one that darkens your screen), not the 3rd one

[SIGPIC]Windows[/SIGPIC]​

Stop hovering to collapse...Click to collapse...Hover to expand...Click to expand...